
RLX2-IHx Series ♦ 802.11a, b, g, n
Configuring a Radio - Detailed Configuration
Industrial Hotspots
User Manual
ProSoft Technology, Inc.
Page 74 of 248
Parameter
Description
Authentication
Method
Specifies the authentication method, sometimes referred to as the inner protocol.
This defines the mechanism used to authenticate the Supplicant of the radio with
the RADIUS server. The following authentication methods are supported:
MS-CHAP
V
2
-
Microsoft’s version of the Challenge Handshake Authentication
Protocol. This method provides mutual authentication between the Supplicant
and the RADIUS server, using a user name and password and challenge text
responses.
MD5
-
Message Digest cryptographic hashing algorithm based on a user name
and password.
TLS
-
Certificate-based inner authentication protocol.
User Name
Specifies the user name of the account that is to be authenticated. When using
EAP-TLS, this represents the identity of the entity assigned to the device
certificate being used.
Password
Specifies the required password when using
EAP-PEAP
or
EAP-TTLS
with
MS-
CHAP
V
2
or
MD5
. This is the password of the account corresponding to the
U
SER
N
AME
.
Certificates
Displays the current certificates installed in the radio, and provides controls to
upload new certificates into the unit. For more information, see
Certificate
Management
(page 74).
Note:
The RLX2-IHx series radio does not ship with any certificates installed.
Certificate Management
When using Enterprise-level security, some EAP methods require the use of X.509
certificates that you must upload to the RLX2-IHx series radio. There are two certificate
types; a certificate from a ‘Certification Authority’ used to authenticate the RADIUS
server to the radio supplicant, and device or client certificate created by the RADIUS
server for the radio. The RLX2-IHx series radio is able to hold one of each certificate
type.
If using EAP-PEAP authentication, you need a CA Certificate (to authenticate the
RADIUS server) and a username and password.
If using EAP-TLS, you need a CA Certificate, a Client Certificate, and Private Key
(contained in a single p12 file) to authenticate the client. The p12 file is encrypted
and requires a password.
Your IT person will provide you with the appropr
iate files that you’ll need to load to
the RLX2-IHx series Repeater radio.